CSC 379 SUM2008:Week 3, Group 2: Difference between revisions

From Expertiza_Wiki
Jump to navigation Jump to search
Line 8: Line 8:


===Evolution of Malware===
===Evolution of Malware===
Many early viruses were not written to cause serious harm to computers, but were rather written as experiments or pranks meant to be annoying.  For instance, the first [http://en.wikipedia.org/wiki/Internet_Worm internet worm] was not intended to cause the millions in damage, but was rather written to gauge the size of the internet.  Even the [http://en.wikipedia.org/wiki/Melissa_virus Melissa virus], written in 1999, was originally intended as a prank.
Another category of malware that appeared is the type intended to cause data loss.  These can either delete files on a hard disk or corrupt a file system by writing junk data.  This can be compared to graffiti, as the author's tag follows the malware as it spreads.
Since 2003, another form of malware that has become increasingly widespread is software intended for profit.  The rise of broadband internet access has allowed this form of malware to spread.  These can include viruses and worms designed to take control of computers for exploitation or denial-of-service attacks designed for extortion.
Furthermore, a new form of for-profit malware that has emerged is [http://en.wikipedia.org/wiki/Spyware spyware].  Unlike other viruses, spyware is not spread through email, but rather installed through exploiting security holes or packaged with software.  Spyware is designed to monitor a user's web-surfing, display advertisements, or redirect affiliate marketing revenue to the creator.
An additional form of malware is BOTS.  BOTS infect a computer and lie dormant until instructions are sent.  BOTS are responsible for most of the spam that is propogated.  Many of the new BOTS last only for one day, not nearly enough time for anti-virus programs to respond.


===Evolution of Malware Distribution===
===Evolution of Malware Distribution===

Revision as of 23:19, 25 July 2008

Costs and Benefits of Malware Countermeasures

Examine the changing nature of malware distribution and forms. What ethical concerns are raised by this new set range of threats? Examine the effects (costs and benefits) of countermeasures designed to address these new threats.

Evolution of Malware

Many early viruses were not written to cause serious harm to computers, but were rather written as experiments or pranks meant to be annoying. For instance, the first internet worm was not intended to cause the millions in damage, but was rather written to gauge the size of the internet. Even the Melissa virus, written in 1999, was originally intended as a prank.

Another category of malware that appeared is the type intended to cause data loss. These can either delete files on a hard disk or corrupt a file system by writing junk data. This can be compared to graffiti, as the author's tag follows the malware as it spreads.

Since 2003, another form of malware that has become increasingly widespread is software intended for profit. The rise of broadband internet access has allowed this form of malware to spread. These can include viruses and worms designed to take control of computers for exploitation or denial-of-service attacks designed for extortion.

Furthermore, a new form of for-profit malware that has emerged is spyware. Unlike other viruses, spyware is not spread through email, but rather installed through exploiting security holes or packaged with software. Spyware is designed to monitor a user's web-surfing, display advertisements, or redirect affiliate marketing revenue to the creator.

An additional form of malware is BOTS. BOTS infect a computer and lie dormant until instructions are sent. BOTS are responsible for most of the spam that is propogated. Many of the new BOTS last only for one day, not nearly enough time for anti-virus programs to respond.

Evolution of Malware Distribution

Ethical Concerns of New Malware

As malware has evolved over the years, so have the ethical concerns associated with them.

Costs and Benefits of Countermeasures

Links and Sources